U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

NIST SP 800-185

SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash

Date Published: December 2016

Planning Note (07/27/2023):

NIST has announced a call for comments on this publication. Submit comments by October 27, 2023.


Author(s)

John Kelsey (NIST), Shu-jen Chang (NIST), Ray Perlner (NIST)

Abstract

Keywords

authentication; cryptography; cSHAKE; customizable SHAKE function; hash function; information security; integrity; KECCAK; KMAC; message authentication code; parallel hashing; ParallelHash; PRF; pseudorandom function; SHA-3; SHAKE; tuple hashing; TupleHash
Control Families

Identification and Authentication; System and Information Integrity

Documentation

Publication:
https://doi.org/10.6028/NIST.SP.800-185
Download URL

Supplemental Material:
Comments Received on Draft SP 800-185 (pdf)

Related NIST Publications:
FIPS 202

Document History:
12/22/16: SP 800-185 (Final)